Analysis
-
max time kernel
17s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe
-
Size
524KB
-
MD5
dcf433658184fa120f39bd06f8fa5ba3
-
SHA1
5a6f16cc88b2106caf0e270dc93badd904124509
-
SHA256
bf205d61c79fa58f46eb94765da5ab65d8b46efb3a6bdf9a71d32db8374b785a
-
SHA512
1e0bc858d614fd62d4f1919b4bb13c59044a93d2321824afb083bc44d60584e64203675a43715f65a468cc05ad6a4e146a14e5d34c129b513219bfb73395602f
-
SSDEEP
12288:unkVmqCiW54tLrMOzdAryeZCefGLg1BBRXHhssx4f:kkIiW5SrMOB8pZ/6gvnXHvx4f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" YUY.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\RO2W4D3WAN5B = "C:\\Users\\Admin\\AppData\\Roaming\\WD96A8SB.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\RO2W4D3WAN5B = "C:\\Users\\Admin\\AppData\\Roaming\\WD96A8SB.exe" svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation YUY.exe -
Executes dropped EXE 4 IoCs
pid Process 2284 Sk1D Crypter Private (2).exe 3648 YUY.exe 2464 winupdate.exe 4776 svchost.exe -
resource yara_rule behavioral2/memory/2284-75-0x00000000055F0000-0x000000000560F000-memory.dmp upx behavioral2/memory/4776-78-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4776-82-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4776-81-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4776-85-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4776-90-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" YUY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RO2W4D3WAN5B = "C:\\Users\\Admin\\AppData\\Roaming\\WD96A8SB.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RO2W4D3WAN5B = "C:\\Users\\Admin\\AppData\\Roaming\\WD96A8SB.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2284 set thread context of 4776 2284 Sk1D Crypter Private (2).exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sk1D Crypter Private (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YUY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4440 cmd.exe 4844 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ YUY.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4844 PING.EXE -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3648 YUY.exe Token: SeSecurityPrivilege 3648 YUY.exe Token: SeTakeOwnershipPrivilege 3648 YUY.exe Token: SeLoadDriverPrivilege 3648 YUY.exe Token: SeSystemProfilePrivilege 3648 YUY.exe Token: SeSystemtimePrivilege 3648 YUY.exe Token: SeProfSingleProcessPrivilege 3648 YUY.exe Token: SeIncBasePriorityPrivilege 3648 YUY.exe Token: SeCreatePagefilePrivilege 3648 YUY.exe Token: SeBackupPrivilege 3648 YUY.exe Token: SeRestorePrivilege 3648 YUY.exe Token: SeShutdownPrivilege 3648 YUY.exe Token: SeDebugPrivilege 3648 YUY.exe Token: SeSystemEnvironmentPrivilege 3648 YUY.exe Token: SeChangeNotifyPrivilege 3648 YUY.exe Token: SeRemoteShutdownPrivilege 3648 YUY.exe Token: SeUndockPrivilege 3648 YUY.exe Token: SeManageVolumePrivilege 3648 YUY.exe Token: SeImpersonatePrivilege 3648 YUY.exe Token: SeCreateGlobalPrivilege 3648 YUY.exe Token: 33 3648 YUY.exe Token: 34 3648 YUY.exe Token: 35 3648 YUY.exe Token: 36 3648 YUY.exe Token: SeIncreaseQuotaPrivilege 2464 winupdate.exe Token: SeSecurityPrivilege 2464 winupdate.exe Token: SeTakeOwnershipPrivilege 2464 winupdate.exe Token: SeLoadDriverPrivilege 2464 winupdate.exe Token: SeSystemProfilePrivilege 2464 winupdate.exe Token: SeSystemtimePrivilege 2464 winupdate.exe Token: SeProfSingleProcessPrivilege 2464 winupdate.exe Token: SeIncBasePriorityPrivilege 2464 winupdate.exe Token: SeCreatePagefilePrivilege 2464 winupdate.exe Token: SeBackupPrivilege 2464 winupdate.exe Token: SeRestorePrivilege 2464 winupdate.exe Token: SeShutdownPrivilege 2464 winupdate.exe Token: SeDebugPrivilege 2464 winupdate.exe Token: SeSystemEnvironmentPrivilege 2464 winupdate.exe Token: SeChangeNotifyPrivilege 2464 winupdate.exe Token: SeRemoteShutdownPrivilege 2464 winupdate.exe Token: SeUndockPrivilege 2464 winupdate.exe Token: SeManageVolumePrivilege 2464 winupdate.exe Token: SeImpersonatePrivilege 2464 winupdate.exe Token: SeCreateGlobalPrivilege 2464 winupdate.exe Token: 33 2464 winupdate.exe Token: 34 2464 winupdate.exe Token: 35 2464 winupdate.exe Token: 36 2464 winupdate.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2464 winupdate.exe 4776 svchost.exe 4776 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2284 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 91 PID 2648 wrote to memory of 2284 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 91 PID 2648 wrote to memory of 2284 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 91 PID 2648 wrote to memory of 3648 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 92 PID 2648 wrote to memory of 3648 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 92 PID 2648 wrote to memory of 3648 2648 dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe 92 PID 2284 wrote to memory of 1404 2284 Sk1D Crypter Private (2).exe 94 PID 2284 wrote to memory of 1404 2284 Sk1D Crypter Private (2).exe 94 PID 2284 wrote to memory of 1404 2284 Sk1D Crypter Private (2).exe 94 PID 3648 wrote to memory of 2464 3648 YUY.exe 96 PID 3648 wrote to memory of 2464 3648 YUY.exe 96 PID 3648 wrote to memory of 2464 3648 YUY.exe 96 PID 3648 wrote to memory of 4440 3648 YUY.exe 97 PID 3648 wrote to memory of 4440 3648 YUY.exe 97 PID 3648 wrote to memory of 4440 3648 YUY.exe 97 PID 1404 wrote to memory of 2784 1404 vbc.exe 99 PID 1404 wrote to memory of 2784 1404 vbc.exe 99 PID 1404 wrote to memory of 2784 1404 vbc.exe 99 PID 4440 wrote to memory of 4844 4440 cmd.exe 100 PID 4440 wrote to memory of 4844 4440 cmd.exe 100 PID 4440 wrote to memory of 4844 4440 cmd.exe 100 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101 PID 2284 wrote to memory of 4776 2284 Sk1D Crypter Private (2).exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcf433658184fa120f39bd06f8fa5ba3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Sk1D Crypter Private (2).exe"C:\Users\Admin\AppData\Local\Temp\Sk1D Crypter Private (2).exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q0q4vcgj\q0q4vcgj.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6721.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCF6A68FFE013413E805E5F343B7DBD69.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\YUY.exe"C:\Users\Admin\AppData\Local\Temp\YUY.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\YUY.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4844
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4140 /prefetch:81⤵PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2952,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4916 /prefetch:31⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5130c887790fb48c5f3b8b95120955d09
SHA1abc4f9d2969c8c4c38ae8c6c71d2d2e3204d097a
SHA256733714d4e01c98cd127b58563ffa0aa8ebc2753c76ccb9642be7e71978d053b7
SHA5124605d26960b39b844a697d37232a7a3f488e0b77c2d405eed924be6446985633bbd21b1aa4990b742715114b7c462db51a1fdaadb06bf9f42d38930ff9c9f3ce
-
Filesize
97KB
MD5c4236e67457ef81805dc0fc794517dc3
SHA18b50072e37d7440f4e5e61396e5acd99d9a1c011
SHA256b08424444100bed728548307e14cfd8b053b8428752fb73274a403ee6879fa02
SHA512cb8398390a3a95aab646633c9b6645f1a5756e416e499d79ea5635be91de380dd9e37d21621d83954b8ecff836b8e4a995c5c723766a72929f5a4b8f13d066ab
-
Filesize
648KB
MD557089c99b82d3fd491042192387cbe90
SHA1554774a909f2c31d12a7a7fa09ee3968272a0520
SHA256109b5ae69687dabc995389584168a8237c9b0ebbc2fe8b2461cf43aa8240ded3
SHA51223db73f870b820e2383681bcd4d28ba326f27514d3bc2a9232b2ac84677a6c8b488785c94683e35def65c89889b392dc1445e8f774071e9fdef1e2433edea0bc
-
Filesize
60KB
MD5063a440f561964ada316e1e2b496b875
SHA150cdf29c1060f78a9b4b657f6d9d457f060b3e6e
SHA25655760883d25a9e2b67fdeb5bf0fe83461532f3c14a7c8e69cebe762b49a3079c
SHA512c7a8950cae6a08b9517dc3dabaa89eccfac6c7596e2fcfc88161e22f0d3b904701be12fc1deaf0855ac7baa2bd54acb26ef7a8789f584cefb8f75dee32de171a
-
Filesize
224B
MD569326c85784dfe6ee46c97ecec95993d
SHA184db3abbcbe0e49ab831d296e3b3a2b5ae4b1725
SHA256e4edb92cc89c6dcdb080bf1ff19d34a32257e64a4c402388342d727849e40c5c
SHA512e5408e44995d2f4ac9ae1bc69c7ed1c1bc9bc546a7599784919e5e15269a471e6afd0d6862232b62785ba062d6b5ecf0a0ce5b1be0e364ab3e734715ef8fe2ca
-
Filesize
102KB
MD57f2066a1808b6ef1ef3aecdad98417bb
SHA193ff5045b0879f5cab8bef7477327a3107bdf9c0
SHA2561342e85dc05d9757b47568e6bd1b3e08016fdde36508bd52afa6ba0d5ddc8126
SHA51289067aa3c275f9b2ecb4255c79fd5c248c4abd8bb788e8764641160755e807fa7ad4d89865c5e9af78cd5f47c47c6ddf6b7c14549c5ac1bf37195c8c27d3ec26
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
652B
MD539aee33f2cde14685715c8a3e9c15dcf
SHA140575e07a2e1be5aac86e3b42251db7bfc1da496
SHA2564809fda409ef37ef864b8b002e05720e4346f954ed5c0f11464536871d4aded6
SHA512b5bcbd622c80bfaa802f1ce1ba6a4262a3b043d71b3291289105c3e30fbb839eb5bd8cbb1a119e2f7608ad3a9515099d59c0b03ac63772d4f7921229caeffbf1